{"title":"Real time handwriting recognition system using CNN algorithms","authors":"Maryam Al-Mashhadani","doi":"10.31185/wjcms.157","DOIUrl":"https://doi.org/10.31185/wjcms.157","url":null,"abstract":"Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition using the recent artificial intelligent algorithms, the conventional neural network (CNN).
 Different CNN models were tested and modified to produce a system has two important features high performance accuracy and less testing time. These features are the most important factors for real time applications. The experimental results were conducted on a dataset includes over 400,000 handwritten names; the best performance accuracy results were 99.8% for SqueezeNet model.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maad Mijwil, None Abdel-Hameed Al-Mistarehi, None Mostafa Abotaleb, None El-Sayed M. El-kenawy, None Abdelhameed Ibrahim, None Abdelaziz A. Abdelhamid, None Marwa M. Eid
{"title":"From Pixels to Diagnoses: Deep Learning's Impact on Medical Image Processing-A Survey","authors":"Maad Mijwil, None Abdel-Hameed Al-Mistarehi, None Mostafa Abotaleb, None El-Sayed M. El-kenawy, None Abdelhameed Ibrahim, None Abdelaziz A. Abdelhamid, None Marwa M. Eid","doi":"10.31185/wjcms.178","DOIUrl":"https://doi.org/10.31185/wjcms.178","url":null,"abstract":"In healthcare, medical image processing is considered one of the most significant procedures used in diagnosing pathological conditions. Magnetic resonance imaging (MRI), computed tomography (CT), ultrasound, and X-ray visualization have been used. Health institutions are seeking to use artificial intelligence techniques to develop medical image processing and reduce the burden on physicians and healthcare workers. Deep learning has occupied an important place in the healthcare field, supporting specialists in analysing and processing medical images. This article will present a comprehensive survey on the significance of deep learning in the areas of segmentation, classification, disease diagnosis, image generation, image transformation, and image enhancement. This survey seeks to provide an overview of the significance of deep learning in the early detection of diseases, studying tumor localization behaviors, predicting malignant diseases, and determining the suitable treatment for a patient. This article concluded that deep learning is of great significance in improving healthcare, enabling healthcare workers to make diagnoses quickly and more accurately, and improving patient outcomes by providing them with appropriate treatment strategies.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1598 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136248342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized the Performance of Super Resolution Images by Salt and pepper Noise Removal based on a Modified Trimmed Median Filter","authors":"None Muthmainnah","doi":"10.31185/wjcms.191","DOIUrl":"https://doi.org/10.31185/wjcms.191","url":null,"abstract":"Image processing is an interesting area where noisy images can be restored from salt and pepper noise. Various filtering algorithms can be used in the restoration process. Pixels in the original image should not be affected by the restoration process. Despite changes in dimensions and image format, the problem of the existing work persists. A hybrid technique used Ant colony Optimization to remove high-density salt and pepper noise from images. This hybrid technique would remove salt and pepper noise in corrupted images. Ant Colony Optimization (ACO) identifies and selects noisy pixels from corrupted images. It eliminates salt and pepper noise (SP Noise), which causes black and white spots in the original image. All the processes are explained to prove the theory, and the simulation results are presented.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modifying the AES Algorithm by Improving the Add Round Key Stage","authors":"Hasan kadhim Ali Alsuwaiedi","doi":"10.31185/wjcms.162","DOIUrl":"https://doi.org/10.31185/wjcms.162","url":null,"abstract":"This study offers a new adjustment to the Advanced Encryption Standard (AES) in order to assure a high degree of security. This is achieved by replacing the binary (XOR) operation with a new (Xo) operation in each add-round-key stage. The Xo operation generated an extra six randomly selected control keys determined by six state tables (2, 4, 6, 8, 10, and 12) produced from the addition operation in the Galois Field GF (2^2 ,2^4 ,2^6 , 2^8, 2^10 and 2^12 ) in order to boost the algorithm's unpredictability. In the suggested method, an adversary requires at least probabilities of keys to break the message; hence, it improves the difficulty of the original AES against brute force attacks. also enhances the performance of additional security metrics, such as NIST tests, compared to the original AES. Consequently, this replacement, including the use of six keys in both the encryption and decryption processes, offers a new level of security and a higher degree of resistance to data breaches. The novelty of the proposed (Xo) technique lies in the construction of GF tables ( 2^6 , 2^10 and 2^12) to be used in the encryption and decryption process for the first time, as well as the approach utilized to create the code for it.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of PWM AC Choppers with Different Loads with and Without Neural Network Application","authors":"None Mariem Bounabi, None Guma Ali","doi":"10.31185/wjcms.196","DOIUrl":"https://doi.org/10.31185/wjcms.196","url":null,"abstract":"In this paper, we focus on the \"Artificial Neural Network (ANN) based PWM-AC chopper\". This system is based on the PWM AC chopper-encouraged single-phase induction motor. The main purpose of this paper is to design and implement an ideal technique regarding speed control. Here analyzed PWM-based AC-AC converter with resistive load, R-L load and finally, the PWM AC chopper is fed to single phase induction for speed control. Using other soft computing and optimization techniques such as Artificial Neural Networks, Fuzzy Logic, Convolution algorithm, PSO, and Neuro Fuzzy can control the Speed. We used Artificial Neural Network to control the Speed of the PWM-AC Single phase induction motor drive. The Neural Network toolbox has been further used for getting desired responses. Neural system computer programs are executed in MATLAB. The performance of the proposed method of ANN system of PWM AC Chopper fed single phase induction motor drive is better than other traditional and base methods for controlling the Speed, based on the MOSFET.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135041265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Yundong, None Alexander Zhulev, None Omar G. Ahmed
{"title":"Credit Card Fraud Identification using Logistic Regression and Random Forest","authors":"Wang Yundong, None Alexander Zhulev, None Omar G. Ahmed","doi":"10.31185/wjcms.184","DOIUrl":"https://doi.org/10.31185/wjcms.184","url":null,"abstract":"Fraud is an ancient yet ever-changing profession. Because of the digitization of money, financial transactions, banks, fraudsters now have a limitless number of possibilities to perpetrate crime from behind a screen, anywhere around the world. Fraud has a broad influence, with direct ramifications for business and the economy. It is of great worry to cybercrime organizations as recent studies have proven that ML algorithms may successfully be utilized to identify fraudulent transactions in massive amounts of payment data. Such techniques may identify fraudulent transactions in real time, which human auditors may miss. In this research, we apply supervised ML algorithms to the issue of fraud identification by analyzing simulated financial transaction data that is available to the public. Our aim is to show how supervised ML methods may be utilized to successfully identify data with extreme class disproportion. By way of example, we show how exploratory analysis may be utilized to identify fraudulent from real purchases. We also show that Random Forest outperform Logistic Regression when applied to a clearly distinguished dataset.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Particle Swarm Optimization for Channel Allocation in OFDM Based Cognitive Radio Networks","authors":"Shubham Sharma1","doi":"10.31185/wjcms.189","DOIUrl":"https://doi.org/10.31185/wjcms.189","url":null,"abstract":"It has become increasingly apparent that bandwidth scarcity is an issue as wireless communications advance. Alternatively, spectrum sensing techniques are used to detect licensed users. A spectrum sensor can detect energy, matched filters, and cyclostationary features. There are, however, some drawbacks to these methods. Energy detector performance is affected by noise power uncertainty. Every primary user needs a dedicated receiver for matched filter spectrum sensing. Computational effort and observation time are required for cyclo-stationary feature detection. Spectrum use is determined using particle swarm optimization (PSO), an algorithm for determining the best frequency allocation and highest accuracy. Using PSO operations, this paper proposes an improved energy detection method compared to conventional energy detection methods. Detecting energy and using the PSO channel allocation technique to detect fading channels is also mathematically described.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object Detection Techniques: A Review","authors":"Widad Kadhim, Dr. Mohammed A. Taha","doi":"10.31185/wjcms.165","DOIUrl":"https://doi.org/10.31185/wjcms.165","url":null,"abstract":"Humans can understand their surroundings clearly because they regularly notice objects in their environment. It is essential for the machine to perceive the surroundings similarly to how humans do in order to make it autonomous and capable of navigating in the human world. The machine can assess its surroundings and identify objects using object detection. This can simplify a number of tasks and enable the machine to recognize its surroundings. Making bounding boxes that surround the objects is essentially how object detection systems work to locate objects in an image. Object detection has applications such as autonomous robot navigation, surveillance, face detection, and vehicle","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Tourism Recommender System for Users to Get a Better Choice of Tour","authors":"None Mostafa. M.khater","doi":"10.31185/wjcms.186","DOIUrl":"https://doi.org/10.31185/wjcms.186","url":null,"abstract":"The system might include a turn-by-turn route highlight to prevent fake preferences that check if the user has taken the course. A larger customer overview with more participants is required to acquire more insightful client feedback. Our ex-amination was designed as a lab experiment to gather initial data straight absent. While making fun of other clients and their system comments, we looked at a few initial objective mixtures. Doing field research with actual clients using our suggested model in real-world situations (such as when looking for a course online to work from home) is crucial. This will help us better understand how effective our approach is. In this article, we developed a creative method for recommending multimodal travel routes. In a client survey with 20 participants, we evaluated the applicability of our cross-breed computation and its usability. The results show that CF, in-formation-based, and well-liked course concepts complement one more successfully than cutting-edge course organizer advances. Thanks to the Google Guides Programming interface, our application can give seven different elective trip options.","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct Product and Homomorphism of Flower","authors":"Mohd Shahoodh","doi":"10.31185/wjcm.129","DOIUrl":"https://doi.org/10.31185/wjcm.129","url":null,"abstract":"In this paper an algebraic structure namely flower has been considered. This paper presents the notation of the direct product of two flowers and studied some of its basic properties. Then, this notation has been generalized to a finite family of flowers. Furthermore, the notation of flower homomorphism has been also studied with some of its properties. We proved some properties in view of these notations. ","PeriodicalId":224730,"journal":{"name":"Wasit Journal of Computer and Mathematics Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}